CVE-2025-1686
27.02.2025, 05:15
All versions of the package io.pebbletemplates:pebble are vulnerable to External Control of File Name or Path via the include tag. A high privileged attacker can access sensitive local files by crafting malicious notification templates that leverage this tag to include files like /etc/passwd or /proc/1/environ.
Workaround
This vulnerability can be mitigated by disabling the include macro in Pebble Templates:
java
new PebbleEngine.Builder()
.registerExtensionCustomizer(new DisallowExtensionCustomizerBuilder()
.disallowedTokenParserTags(List.of("include"))
.build())
.build();Enginsight| Vendor | Product | Version |
|---|---|---|
| pebbletemplates | pebble | * |
𝑥
= Vulnerable software versions
Common Weakness Enumeration